Government > EXAM > Annual Security and Counterintelligence Awareness 2022 with complete solution (All)
Annual Security and Counterintelligence Awareness 2022 with complete solution When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefca ... se or zippered pouch made of canvas or other heavy duty material? -Answer- True What are the three classification levels of information? -Answer- 1. Confidential.. 2. Secret. 3. Top Secret. What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?" -Answer- They are used as part of the end-of-day security checks activities that process or store classified material. If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor? -Answer- True. In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material? -Answer- The first priority is protection of life, followed by the protection of classified material. Using curbside mailboxes is an approved method for mailing classified information? - Answer- False. Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply. -Answer- 1. The combination must be protected at the same level as the highest classification of the material authorized for storage. 2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material. Which of the following are approved methods of discussing and transmitting classified material? Select all that apply. -Answer- 1. SIPRnet. 2. Secure Fax. 3. Secure Telephone. Which of the following methods are routinely used for destroying classified information? Select all that apply. -Answer- 1. Burning. 2. Approved cross-cut shredding. 3. Wet-pulping. Which of the following statements below must be on the front of a GSA-approved security container for storing classified information? -Answer- "General Services Administration-Approved Security Container" Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations - Answer- True. Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above. DoD personnel who suspect a coworker of possible espionage should: -Answer- Report directly to your CI or Security Office. Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable? -Answer- None of the above. Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include: -Answer- All of the above. Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." - Answer- True. Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." -Answer- True. If you feel you are being solicited for information which of the following should you do? - Answer- All of the above. Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method? -Answer- False. [Show More]
Last updated: 3 years ago
Preview 1 out of 6 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Sep 18, 2022
Number of pages
6
Written in
All
This document has been written for:
Uploaded
Sep 18, 2022
Downloads
0
Views
122
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·